General

  • Target

    262dd6c5d9ddad7ccd87119b794ff2f2b50c9668b7d15349ce6d0880fc0a55a6

  • Size

    4.0MB

  • Sample

    220830-bvqcnshgdk

  • MD5

    8e070078e871a5432d5e1d4b6fe8fca0

  • SHA1

    87bc4299572fac73c9929ed044ba61324b7b8058

  • SHA256

    262dd6c5d9ddad7ccd87119b794ff2f2b50c9668b7d15349ce6d0880fc0a55a6

  • SHA512

    ae7978be5c348325ba1a68ed543bc8dc0aaa2b6ac57348b424f9cd6ec84304c6d72203f6a3d170abc12fd3461be21920d83e98d53f1d35163c92e597c004d8a8

  • SSDEEP

    98304:SWCkA4QwXz5YbLwW4p92Ihm5E+G7xJzNxE0cPZrTyX/UzxUYO8:SW4DLw/2uKE+G1PG9i/aUB8

Malware Config

Targets

    • Target

      262dd6c5d9ddad7ccd87119b794ff2f2b50c9668b7d15349ce6d0880fc0a55a6

    • Size

      4.0MB

    • MD5

      8e070078e871a5432d5e1d4b6fe8fca0

    • SHA1

      87bc4299572fac73c9929ed044ba61324b7b8058

    • SHA256

      262dd6c5d9ddad7ccd87119b794ff2f2b50c9668b7d15349ce6d0880fc0a55a6

    • SHA512

      ae7978be5c348325ba1a68ed543bc8dc0aaa2b6ac57348b424f9cd6ec84304c6d72203f6a3d170abc12fd3461be21920d83e98d53f1d35163c92e597c004d8a8

    • SSDEEP

      98304:SWCkA4QwXz5YbLwW4p92Ihm5E+G7xJzNxE0cPZrTyX/UzxUYO8:SW4DLw/2uKE+G1PG9i/aUB8

    • YTStealer

      YTStealer is a malware designed to steal YouTube authentication cookies.

    • YTStealer payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks